[6] S. Purification, S. Wuthier, J. Kim, I. Kim, and S.-Y. Chang, “Base station certificate and authentication for 5G radio control security,” in 2025 IEEE 22nd International Conference on Mobile Ad-Hoc and Smart Systems (MASS), 2025. doi: 10.1109/MASS66014.2025.00049
[5] S. Purification, and S.-Y. Chang, "Verifiable Alerts for 4G/5G Public Warning System," 2025 IEEE Conference on Communications and Network Security (CNS), Avignon, France, 2025. doi: 10.1109/CNS66487.2025.11195018
[4] S.-Y. Chang, and S. Purification, "Securing Cellular Availability: The Wireless Blackhole Threat and Defense," 2025 IEEE Conference on Communications and Network Security (CNS), Avignon, France, 2025. doi: 10.1109/CNS66487.2025.11195014
[3] Q. Khan, S. Purification, R. Cheruiyot, J. Kim, I. Kim, and S.-Y. Chang, “Post-Quantum Digital Signature and Authentication for eSIM in 5G Mobile Networking” Silicon Valley Cybersecurity Conference (SVCC) 2025. doi: 10.1109/SVCC65277.2025.11133633
[2] Q. Khan, S. Purification and S. -Y. Chang, "Post-Quantum Key Exchange and ID Encryption Analyses for 5G Mobile Networking," NOMS 2025-2025 IEEE Network Operations and Management Symposium, Honolulu, HI, USA, 2025, pp. 1-9, doi: 10.1109/NOMS57970.2025.11073683.
[1] S. Purification, S. Wuthier, J. Kim, J. Kim and S. -Y. Chang, "Fake Base Station Detection and Blacklisting," 2024 33rd International Conference on Computer Communications and Networks (ICCCN), Kailua-Kona, HI, USA, 2024, pp. 1-9, doi: 10.1109/ICCCN61486.2024.10637542.
[4] Islam, A., Purification, S., & Chang, S.-Y. (2025). Anomaly Detection Against Fake Base Station Threats Using Machine Learning. Journal of Cybersecurity and Privacy, 5(4), 94. doi: 10.3390/jcp5040094
[3] Khan, Q.; Purification, S.; Chang, S.-Y. Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber). Information 2025, 16, 617. doi: 10.3390/info16070617
[2] Purification, S.; Kim, J.; Kim, J.; Chang, S.-Y., “Fake Base Station Detection and Link Routing Defense.” Electronics 2024, 13, 3474. doi: 10.3390/electronics13173474
[1] Purification, S.; Kim, J.; Kim, J.; Kim, I.; Chang, S.-Y., “Distributed and Lightweight Software Assurance in Cellular Broadcasting Handshake and Connection Establishment.”, Electronics 2023, 12, 3782. doi: 10.3390/electronics12183782
[1] S. Purification, S. Wuthier, J. Kim, I. Kim, and S.-Y. Chang, “Base Station Certificate and Multi-Factor Authentication for Cellular Radio Control Communication Security” in arXiv, 2025. https://arxiv.org/abs/2504.02133
[3] S. Purification, K. Park, J. Kim, J. Kim and S. -Y. Chang, "POSTER: Wireless Link Routing to Secure Against Fake Base Station in 5G," 2024 Silicon Valley Cybersecurity Conference (SVCC), Seoul, Korea, Republic of, 2024, pp. 1-3, doi: 10.1109/SVCC61185.2024.10637367
[2] R. Cheruiyot, S. Purification, S. Wuthier and S. -Y. Chang, "POSTER: 5G Remote eSIM Provisioning: Blockchain-based Public Key Delivery," 2024 Silicon Valley Cybersecurity Conference (SVCC), Seoul, Korea, Republic of, 2024, pp. 1-3, doi: 10.1109/SVCC61185.2024.10637375
[1] Q. Khan, S. Purification, R. Cheruiyot, J. Kim, J. Kim and S. -Y. Chang, "POSTER: Toward Post-Quantum Digital Certificate for eSIM," 2024 Silicon Valley Cybersecurity Conference (SVCC), Seoul, Korea, Republic of, 2024, pp. 1-3, doi: 10.1109/SVCC61185.2024.10637354